Multi-party computation enables secure polynomial control based solely on secret-sharing
暂无分享,去创建一个
Stefan Wildhagen | Michael Hertneck | Frank Allgower | Sebastian Schlor | F. Allgöwer | Stefan Wildhagen | Michael Hertneck | Sebastian Schlor
[1] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[2] Farhad Farokhi,et al. Secure and Private Implementation of Dynamic Controllers Using Semihomomorphic Encryption , 2018, IEEE Transactions on Automatic Control.
[3] Tibor Jager,et al. Encrypted Cloud-based Control using Secret Sharing with One-time Pads , 2019, 2019 IEEE 58th Conference on Decision and Control (CDC).
[4] Yehuda Lindell,et al. High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority , 2016, IACR Cryptol. ePrint Arch..
[5] Craig Gentry,et al. Computing arbitrary functions of encrypted data , 2010, CACM.
[6] Farhad Farokhi,et al. Towards Encrypted MPC for Linear Constrained Systems , 2018, IEEE Control Systems Letters.
[7] Ueli Maurer,et al. General Secure Multi-party Computation from any Linear Secret-Sharing Scheme , 2000, EUROCRYPT.
[8] Moritz Schulze Darup,et al. Encrypted Model Predictive Control in the Cloud , 2019 .
[9] Dragan Nesic,et al. Secure Control of Nonlinear Systems Using Semi-Homomorphic Encryption , 2018, 2018 IEEE Conference on Decision and Control (CDC).
[10] Iman Shames,et al. Secure and private control using semi-homomorphic encryption , 2017 .
[11] Masako Kishida,et al. Encrypted Control System with Quantizer , 2018, IET Control Theory & Applications.
[12] Vladimir Kolesnikov,et al. A Pragmatic Introduction to Secure Multi-Party Computation , 2019, Found. Trends Priv. Secur..
[13] Moritz Schulze Darup,et al. Encrypted polynomial control based on tailored two‐party computation , 2020, International Journal of Robust and Nonlinear Control.
[14] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[15] Takahiro Fujita,et al. Cyber-security enhancement of networked control systems using homomorphic encryption , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[16] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[17] Moritz Schulze Darup,et al. Verschlüsselte Regelung in der Cloud - Stand der Technik und offene Probleme , 2019, Autom..
[18] Arpita Patra,et al. BLAZE: Blazing Fast Privacy-Preserving Machine Learning , 2020, IACR Cryptol. ePrint Arch..
[19] Amos Beimel,et al. Secret-Sharing Schemes: A Survey , 2011, IWCC.
[20] Sophie Tarbouriech,et al. Design of Polynomial Control Laws for Polynomial Systems Subject to Actuator Saturation , 2013, IEEE Transactions on Automatic Control.